IoT Agenda:

Authentication


July 3, 2019  3:11 PM

Managing IIoT security with cloud-based VPNs

Julian Weinberger Profile: Julian Weinberger
Authentication, cloud-based VPN, Data Encryption, Endpoint management, IIoT, IIoT security, Industrial IoT, iot security, Managed VPNs, Remote access, Remote management, VPN

As part of Industry 4.0, smart devices are being introduced to industrial systems to track a wide range of data and provide valuable insights in real time. Pressure sensors, for example, monitor pipelines to detect leaks; level sensors measure waste recycling, fuel storage or irrigation; and water...

June 5, 2019  1:55 PM

IoT device manufacturers: It’s time to secure our children’s smartwatches

Peter Berg Profile: Peter Berg
Authentication, Consumer IoT, Encryption, Identity Tokens, Internet of Things, iot, IoT data, IoT devices, iot privacy, iot security, securing IoT, Security tokens, Smartwatch, smartwatches, Tokenization, tokens

For concerned parents who want to ensure the safety of their children, smartwatches have become a promising solution for families seeking convenience and peace of mind. But while these devices have provided much-needed peace of mind for many parents, they have also opened up a host of security...


May 8, 2019  12:21 PM

The common misnomer about recent Nest hack reports

Alec Rooney Profile: Alec Rooney
2FA, Authentication, Internet of Things, iot, IoT devices, iot security, password security, securing IoT, Two factor authentication

Recently, Nest has made attention-grabbing headlines for security incidents. One Nest owner heard 0 Comments     RSS Feed     Email a friend


May 1, 2019  12:44 PM

Beyond SB-327: Moving toward true IoT security

Arshad Noor Profile: Arshad Noor
Authentication, FIDO, FIDO Alliance, Internet of Things, iot, iot security, password security, Passwords, securing IoT, U2F

In light of a cybersecurity environment of never-ending attack vectors, legislators are working to make the digital world more secure. The California Consumer Privacy Act (CCPA), set to take effect on January 1, 2020, has grabbed most of the headlines in this regard, but a little-known bill called...


April 15, 2019  12:48 PM

Securing the IoT edge

John Maddison Profile: John Maddison
Authentication, credentials, Edge computing, edge security, firewall, intent-based segmentation, Internet of Things, iot, IoT communications, IoT devices, IoT edge, IoT encryption, iot security, network access control, securing IoT, Segmentation

The network has undergone a remarkable amount of change over a remarkably short period of time. The clearly defined perimeters of traditional networks have been eroded away by BYOD, mobile computing, migration to the cloud, IoT adoption and the new WAN edge. Of course, this sort of evolution is...


April 9, 2019  2:00 PM

Today’s PKI is purpose-built and ready for IoT

Jason Soroko Profile: Jason Soroko
attack detection, attack prevention, Authentication, Internet of Things, iot, IoT attacks, IoT legislation, IoT regulations, iot security, Mirai, PKI, Public-key infrastructure, securing IoT, Stuxnet

As connected devices become common throughout a wide range of industries, it should come as no surprise that we are reading about the increasing frequency of attacks targeting IoT devices and systems. Particularly alarming are the facts that many of these attacks are now targeting devices linked to...


March 28, 2019  12:17 PM

The new standard for IoT security

Mahmoud Abdelkader Profile: Mahmoud Abdelkader
Authentication, Data-security, Internet of Things, iot, IOT Network, iot security, securing IoT, sensor network, SSL, TLS, wireless sensor network

It's undeniable that the internet of things will continue growing in popularity across a wide array of industries. More and more applications will begin to deploy wireless sensor networks as part of their products, services or operations, making it imperative for organizations to increase their...


February 20, 2019  10:38 AM

Strong security can unleash the promise of the industrial internet of things

Dan Timpson Profile: Dan Timpson
Authentication, Certificate authority, Digital certificates, IIoT, IIoT security, industrial internet of things, Industrial IoT, Internet of Things, iot, iot security, PKI

Scan the headlines and you'd think IoT is all about Bluetooth toasters and refrigerators that text you when your toast is going to burn or you're out of milk. Analysts and investors know better. The serious money in IoT is flowing to the industrial sector, for good reason. Connected consumer...


February 19, 2019  10:08 AM

How to manage IIoT authentication and protect machine identities

Julian Weinberger Profile: Julian Weinberger
Authentication, Certificates, Identity management, IIoT, IIoT security, iot security, Managed VPNs, VPN

The global demand for IIoT equipment is growing rapidly. The importance of IIoT is also reflected in the resources major technology brands like Microsoft, Amazon and IBM are pouring into


February 5, 2019  12:45 PM

Smart biometric template storage often requires a hybrid approach

George Brostoff George Brostoff Profile: George Brostoff
Authentication, biometric, Biometrics, Data privacy, Data-security, GDPR, Identification, IoT data, iot privacy, iot security

One of the key issues that comes up when talking with leaders in the biometric security space is around who owns and where to store the biometric data -- particularly face authentication templates with the mathematical...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: